Disk Encryption Legalities: Massachusetts Court Orders Lawyer To Decrypt Laptop.

The Massachusetts Supreme Judicial Court (MSJC) has ordered a lawyer to decrypt his laptop computers.  The lawyer, one Leon Gelfgatt, is a criminal suspect in an ongoing case involving Russians and mortgage fraud, and as far as I can tell (as a non-lawyer), his biggest mistake was in not following the aged maxim: “don’t speak […] read more

Data Security: US Supreme Court Says Warrants Needed For Cellphone Search.

According to the US Supreme Court, US authorities require warrants in order to search the cellphones of people who are arrested [http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf ; ].  The decision is not solely for cellphones, though: rummaging through information found on smartphones, tablet computers, laptops, etc. should also be affected, with personal privacy being the winner. Also, I imagine […] read more

Is BYOD Leaving Your Company Wide Open to Security Breaches?.

The BYOD culture is saving companies about $1,300 per mobile user. Employees who bring their own devices also tend to be happier and more productive. How could a BYOD policy possibly have any downside? Unfortunately, BYOD also brings new security concerns. Recent data breaches have brought the need for data security to the news on a […] read more

UK Data Breaches: ICO Reviewing Impact Of Monetary Penalties, Threatens "Contempt Of Court" Charges.

The UK’s Information Commissioner’s Office (ICO) is investigating the effects of monetary penalties on organizations that breach the Data Protection Act (DPA).  With the ability to fine up to £500,000, the monetary penalty is a formidable way DPA enforcement tool: not only does the fear of a large fine prompt action, it spreads the news […] read more

HIPAA Encryption Report: HHS/OCR Releases 2011/2012 Annual Report on PHI Breaches.

The US Department of Health and Human Services, Office for Civil Rights has released their annual report on data breaches involving protected health information.  The report covers the dates of January 1, 2011 through December 31, 2012, according to phiprivacy.net.  While it may reflect the near past, it shows why HIPAA encryption is so important: […] read more

Cryptography Is Fun, But Your Business Calls for Encryption.

How can you effectively secure your data? Recent breaches have highlighted the need to step up security measures, but what options do you have? Many people use the terms cryptography and encryption interchangeably. Unfortunately, cryptography, while fun in social situations to create “secret” messages, is not going to protect your data. And even encryption that uses […] read more